Search Results - (( java application tree algorithm ) OR ( based observational method algorithm ))
Search alternatives:
- observational method »
- java application »
- application tree »
- method algorithm »
- tree algorithm »
-
1
-
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
4
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
Get full text
Get full text
Get full text
Thesis -
5
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…In this paper, we propose an improvement of pattern growth-based PrefixSpan algorithm, called I-PrefixSpan. The general idea of I-PrefixSpan is to use the efficient data structure for general tree-like framework and separator database to reduce the execution time and memory usage. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Modified least trimmed squares method for face recognition / Nur Azimah Abdul Rahim
Published 2018“…The genetic algorithm configuration for n (number of observations) and p (parameter) was changed to assess the performance of modified method. …”
Get full text
Get full text
Thesis -
7
Disturbance-Kalman state for linear offset free MPC
Published 2022“…Based on the drawbacks observed in those methods, a novel algorithm is proposed to guarantee offset-free MPC under model-plant mismatches and disturbances by combining the two proposed methods which are the proposed Recursive Kalman estimated state method and the proposed Disturbance-Kalman state method. …”
Get full text
Get full text
Article -
8
AI powered asthma prediction towards treatment formulation: an android app approach
Published 2022“…We utilized eight robust machine learning algorithms to analyze this dataset. We found that the Decision tree classifier had the best performance, out of the eight algorithms, with an accuracy of 87%. …”
Get full text
Get full text
Get full text
Article -
9
Research On Photovoltaic Mppt Control Method Based On Improved Bas Algorithm And Variable Step-Size Inc Method
Published 2024“…Commonly used control methods include CVT method, perturbation and observation method, and incremental conductance method. …”
Get full text
Get full text
Thesis -
10
Dual search maximum power point algorithm based on mathematical analysis under partially-shaded conditions
Published 2016“…In this work, the perturb and observation (P&O) method based on duty cycle adjustment is introduced, which is modified to increase speed of the search and also to reduce the oscillation.The simulation and experimental works have been performed to investigate behavior and performance of the proposed algorithm. …”
Get full text
Get full text
Thesis -
11
Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification
Published 2011“…System identification is a method of determining a mathematical relation between variables and terms of a process based on observed input-output data. …”
Get full text
Get full text
Get full text
Article -
12
AI powered asthma prediction towards treatment formulation : An android app approach
Published 2022“…We utilized eight robust machine learning algorithms to analyze this dataset. We found that the Decision tree classifier had the best performance, out of the eight algorithms, with an accuracy of 87%. …”
Get full text
Get full text
Get full text
Article -
13
A maximal-clique-based clustering approach for multi-observer multi-view data by using k-nearest neighbor with S-pseudo-ultrametric induced by a fuzzy similarity
Published 2024“…The clustering results are analyzed based on several indexes. This analysis shows the efficiency of the proposed algorithm compared to the traditional clustering methods. © The Author(s), under exclusive licence to Springer-Verlag London Ltd., part of Springer Nature 2024.…”
Get full text
Get full text
Article -
14
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…The proposed method combined the New Teaching-Learning-Based Optimization Algorithm (NTLBO), Support Vector Machine (SVM), Extreme Learning Machine (ELM), and Logistic Regression (LR) (feature selection and weighting) NTLBO algorithm with supervised machine learning techniques for Feature Subset Selection (FSS). …”
Get full text
Get full text
Get full text
Article -
15
The performance of k-means clustering method based on robust principal components
Published 2018“…The k-means clustering method is the most widely used method to group n observations into k clusters. …”
Get full text
Get full text
Article -
16
Observer-based fault detection approach using fuzzy adaptive poles placement system with real-time implementation
Published 2021“…This paper validated the system simulation by implementing fault detection algorithms by using a real-time embedded observer-based system. …”
Get full text
Get full text
Article -
17
Power Stabilization Of A Stand-Alone Solar System Using Perturb and Observe MPPT Algorithm
Published 2010“…This paper presents the method of power stabilization of a stand-alone solar system using perturb and observe (P&O) maximum power point algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
18
Modeling flood occurences using soft computing technique in southern strip of Caspian Sea Watershed
Published 2012“…In recent years soft computing methods like fuzzy logic and genetic algorithm are being used in modeling complex processes of hydrologic events. …”
Get full text
Get full text
Thesis -
19
Safe experimentation dynamics algorithm for data-driven PID controller of a class of underactuated systems
Published 2019“…The performance comparison was made only between the SED based method and G-NL-SPSA based method. In addition, the average percentage of the control objective improvement retrieved from the 30 trials for each method was also observed.…”
Get full text
Get full text
Thesis -
20
Safe experimentation dynamics algorithm for data-driven PID controller of a class of underactuated systems
Published 2019“…The performance comparison was made only between the SED based method and G-NL-SPSA based method. In addition, the average percentage of the control objective improvement retrieved from the 30 trials for each method was also observed.…”
Get full text
Get full text
Thesis
